Feedback

X
Intrusion Detection Systems

Intrusion Detection Systems

0 Ungluers have Faved this Work
The current structure of the chapters reflects the key aspects discussed in the papers but the papers themselves contain more additional interesting information: examples of a practical application and results obtained for existing networks as well as results of experiments confirming efficacy of a synergistic analysis of anomaly detection and signature detection, and application of interesting solutions, such as an analysis of the anomalies of user behaviors and many others.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Links

DOI: 10.5772/593

Editions

edition cover

Share

Copy/paste this into your site: